Table of Contents

Introduction

CHAPTER 1:
Introduction to Networking Technologies

Wired and Wireless Network Topologies

Bus Topology

Ring Topology

Star Topology

Wired Mesh Topology

Wireless Topologies

Hybrid Topologies

Network Types

LANs

WLANs

WANs

MANs

CANs

SANs

PANs

IoT Technologies

Z-Wave

Ant+

Bluetooth

NFC

IR

RFID

802.11

The Magic Behind 802.11n and 802.11ac

A Summary of 802.11 Wireless Standards

What’s Next?

CHAPTER 2:
Models, Ports, Protocols, and Networking Services

The OSI Networking Model

The OSI Seven-Layer Model

Comparing OSI to the Four-Layer TCP/IP Model

Identifying the OSI Layers at Which Various Network Components Operate

Ports and Protocols

Connection-Oriented Protocols Versus Connectionless Protocols

Internet Protocol

Transmission Control Protocol

User Datagram Protocol

File Transfer Protocol

Secure File Transfer Protocol

Trivial File Transfer Protocol

Simple Mail Transfer Protocol

Hypertext Transfer Protocol

Hypertext Transfer Protocol Secure

Post Office Protocol Version 3/Internet Message Access Protocol Version 4

Telnet

Secure Shell

Internet Control Message Protocol

Network Time Protocol

Lightweight Directory Access Protocol

H.323

Simple Network Management Protocol

Session Initiation Protocol

Remote Desktop Protocol

Server Message Block

Understanding Port Functions

ARP and RARP

Network Services

Domain Name Service (DNS)

The DNS Namespace

Types of DNS Entries

DNS Records

DNS in a Practical Implementation

Dynamic Host Configuration Protocol

The DHCP Process

DHCP and DNS Suffixes

DHCP Relays and IP Helpers

IP Address Management

Network Time Protocol

What’s Next?

CHAPTER 3:
Addressing, Routing, and Switching

IP Addressing

IPv4

IP Address Classes

Subnet Mask Assignment

Subnetting

Identifying the Differences Between IPv4 Public and Private Networks

Classless Interdomain Routing

Default Gateways

Virtual IP

IPv4 Address Types

IPv6 Addressing

Comparing IPv4 and IPv6 Addressing

Assigning IP Addresses

Identifying MAC Addresses

NAT, PAT, SNAT, and DNAT

Managing TCP/IP Routing and Switching

The Default Gateway

Routing Tables

Static Routing

Switching Methods

Software-Defined Networking

Dynamic Routing

Network Traffic

Routing Metrics

Virtual Local-Area Networks

The Spanning Tree Protocol

Interface Configuration and Switch Management

Trunking

Port Mirroring

Port Authentication

Power over Ethernet

DMZ

MAC Address Table

Switch Management

Managed and Unmanaged

Quality of Service

Traffic Shaping

Access Control Lists

What’s Next?

CHAPTER 4:
Network Components and Devices

Common Network Devices

Firewall

Router

Switch

Hub

Bridge

Modems

Wireless Access Point

Media Converter

Wireless Range Extender

VoIP Endpoint

Network Devices Summary

Advanced Networking Devices

Multilayer Switch

Wireless Controller

Load Balancer

IDS/IPS

Proxy Server

VPN Concentrator

AAA/RADIUS Server

UTM Appliances and NGFW/Layer 7 Firewalls

VoIP PBX and Gateway

Content Filter

What’s Next?

CHAPTER 5:
WAN Technologies

WAN Technologies

Integrated Services Digital Network

Leased Lines

Fiber, SONET, and OCx Levels

Frame Relay

Asynchronous Transfer Mode

Copper Versus Fiber

Other WAN Technologies

Internet Access Technologies

DSL Internet Access

Cable Broadband

Broadband Security Considerations

Dial-up

The Public Switched Telephone Network

Satellite Internet Access

Wireless Internet Access

Termination Points

What’s Next?

CHAPTER 6:
Cabling Solutions

General Media Considerations

Broadband Versus Baseband Transmissions

Simplex, Half-Duplex, and Full-Duplex Modes

Data Transmission Rates

Types of Network Media

Types of Media Connectors

Media Couplers/Converters

568A and 568B Wiring Standards

Straight-Through Versus Crossover Cables

Rollover and Loopback Cables

Components of Wiring Distribution

Ethernet Deployment Standards

Troubleshooting Common Wired Connectivity Issues

Attenuation

Latency

Jitter

Crosstalk

EMI

Open/Short

Incorrect Pin-Out

Incorrect Cable Types

Bad Port

Transceiver Mismatch

TX/RX Reversed

Duplex/Speed Mismatch

Damaged Cables

Bent Pins

Bottlenecks

VLAN Mismatch

Network Connection LED Status Indicators

What’s Next?

CHAPTER 7:
Wireless Solutions

Understanding Wireless Basics

Wireless Channels and Frequencies

Cellular Access

Speed, Distance, and Bandwidth

Channel Bonding

MIMO/MU-MIMO/Unidirectional/Omnidirectional

Site Surveys

Establishing Communications Between Wireless Devices

Configuring the Wireless Connection

Troubleshooting Wireless Issues

Factors Affecting Wireless Signals

Troubleshooting AP Coverage

What’s Next?

CHAPTER 8:
Cloud Computing and Virtualization

Cloud Concepts

Software as a Service

Platform as a Service

Infrastructure as a Service

Other Types of Services

Private Cloud

Public Cloud

Hybrid Cloud

Connectivity Methods

Security Implications and Considerations

The Relationship Between Resources

Virtualization and Storage-Area Networks

Virtualization

Storage-Area Networks

What’s Next?

CHAPTER 9:
Network Operations

Documentation Management

Wiring and Port Locations

Physical and Logical Network Diagrams

Baselines

Policies, Procedures, Configurations, and Regulations

Labeling

Business Continuity and Disaster Recovery

Backups

Backup Best Practices

Using Uninterruptible Power Supplies

Alternatives to UPS

Hot, Warm, and Cold Sites

High Availability and Recovery Concepts

Monitoring Network Performance

Common Reasons to Monitor Networks

SNMP Monitors

Packet Sniffers

Throughput Testing

Port Scanners

Vulnerability Scanners

Network Performance, Load, and Stress Testing

Tracking Event Logs

Remote Access

Remote File Access

VPNs

Site-to-Site and Client-to-Site

HTTPS/Management URL

Out-of-Band Management

What’s Next?

CHAPTER 10:
Network Security

Physical Security and Device Hardening

Adding Physical Security to the Mix

Two-Factor and Multifactor Authentication

Secured Versus Unsecured Protocols

Additional Device Hardening

Authentication and Access Controls

Mandatory Access Control

Discretionary Access Control

Rule-Based Access Control

Role-Based Access Control

RADIUS and TACACS+

Kerberos Authentication

Local Authentication

Lightweight Directory Access Protocol

Using Certificates

Auditing and Logging

Multifactor Authentication Factors

Access Control

Securing Wireless Networks

WPA, WPA2, TKIP-RC4, and CCMP-AES

Wireless Authentication and Authorization

Shared, Preshared, and Open Keys

Common Networking Attacks

Denial-of-Service and Distributed Denial-of-Service Attacks

Other Common Attacks

Vulnerabilities and Prevention

Mitigation Techniques

Signature Management

Device Hardening

Change Native VLAN

Switch and Port Protection

Demilitarized Zones (Perimeter Network)

VLAN Network Segmentation

Privileged User Account

File Integrity Monitoring

Role Separation

Using ACLs to Restrict Access

Honeypots and Honeynets

Penetration Testing

What’s Next?

CHAPTER 11:
Network Troubleshooting

Troubleshooting Steps and Procedures

Identify the Problem

Establish a Theory of Probable Cause

Test the Theory to Determine Cause

Establish a Plan of Action

Implement the Solution or Escalate

Verify Full System Functionality

Document the Findings, Actions, and Outcomes

Hardware and Software Troubleshooting Tools

Wire Crimpers, Strippers, and Snips

Tone Generator and Probes

Loopback Adapter

Protocol Analyzer

Media/Cable Testers

TDR and OTDR

Multimeter

Spectrum Analyzer

Packet Sniffers

Port Scanner

Wi-Fi Analyzer

Bandwidth Speed Tester and Looking Glasses

Environmental Monitors

Command-Line Troubleshooting Tools

The Trace Route Utility (tracert/traceroute)

ping

ARP

The netstat Command

ipconfig

ifconfig

nslookup

dig

The tcpdump Command

The route Utility

nmap

Troubleshooting Common Network Service Issues

Common Problems to Be Aware Of

Hardware Failure

What’s Next?

Glossary

Index